~New Citrix research reveals one in five large companies do not have any contingency measures in place in case of a ransomware attack~ Today, new research has revealed that one in five (20 per cent) medium to large UK businesses do not have any contingency measures in place in case of a ransomware attack, with almost half of British businesses (48 per cent) failing to back up their company data at least once a day. The research – commissioned by Citrix and carried out by Censuswide – quizzed 250 IT and security specialists in companies with 250 or more employees across the UK to…
Author: ISBuzz Team
Nearly One in Five Employees Consider Their Storage Inadequate for Collaborative Working A survey conducted by Nexsan™, a global leader in unified storage solutions, at Cloud Expo in London last month, revealed that data security and download speeds were the top two barriers to a truly connected workforce. The survey reveals that 98% of users need to work remotely or collaboratively, with nearly two thirds (61%) responding that they need to access company data on their own devices (BYOD). Further findings reveal that: 76% are required to access work documents away from the office 73% work remotely 58% work from other offices…
The proliferation of cyber threats against UK enterprises has resulted in the British government demanding organisations do more to protect their corporate network and the data that sits within it. While the majority of cyber attacks originate from the outside, Julian Cook, Director of UK Business at M-Files Corporation, a provider of enterprise information management (EIM) solutions, highlights the critical importance of businesses also understanding and defending against security risks and threats that originate from within an organisation. Recently, government research revealed that two-thirds of large businesses in the UK had experienced a cyber breach in the past year, in some cases causing…
2.5 million UK households received a scam call in the last month Nearly half of Brits admit they wouldn’t be able to spot a scam TalkTalk partners with Get Safe Online to launch nationwide ‘Beat the Scammers’ campaign Telephone and internet scams across the UK have reached an all-time high, with Britons now more likely to receive a landline call from a scammer (72%), than from our best friends (36%) or family members (64%). According to new research released today by TalkTalk and Get Safe Online, 2.5 million UK households received a scam call last month. 63% received a suspicious…
In its newest Phishing Activity Trends Report, the APWG noted a 250% increase in phishing sites between October 2015 and March 2016 — and the 2016 uptick indicates an alarming trend. Wombat CEO Joe Ferrara commented on this report below. Joe Ferrara, President and CEO at Wombat Security Technologies: Spam filters, blacklists, firewalls, and other technical safeguards do not stop all phishing emails from getting to end users. That can’t be disputed. Organizations that want to give themselves the best shot at reducing successful attacks from the wild — and the malware and ransomware infections that come with them — must…
Last month, a Brazilian court order mandated the 72 hour shutdown of popular mobile messaging application, WhatsApp, leaving its roughly 100 million users in Brazil unable to communicate with family and friends abroad. In response to WhatsApp’s refusal to turn over chat records related to an ongoing drug investigation, claiming these records were not accessible following the app’s newly implemented end-to-end encryption capabilities, the court saw no solution other than shutting down the app. Enter network intelligence; this situation could have been easily avoided if Brazilian operators had the ability to effectively filter app traffic. In fact, granular application visibility…
Ian Trump explores some of the IT security takeaways from the recent trial in the US of a member of the Syrian Electronic Army. An interesting story caught my attention recently about the trial of a member of the Syrian Electronic Army (SEA), and I wanted to take this opportunity to do a deep dive into it to understand what recent cyber war operations might look like. Strangely, they look an awful lot like the regular battle most of the small and medium businesses I know face almost every day. However, in the case of many overseas cyber war protagonists…
Following the news that Mitsubishi Outlander hybrid car alarm ‘hacked’, here below the comments from two different sources. Richard Kirk, SVP at AlienVault John Smith Principal Solution Architect at Veracode Richard Kirk, SVP at AlienVault: Mitsubishi have taken a different approach to enabling access to the Mitsubishi Outlander hybrid. Whereas most, if not all other car manufacturers provide support for their car apps through a cloud based service, which in turn sends instructions directly to the car, Mitsubishi appear to be using an onboard wifi network which the app directly connects to. This might appear to offer support for cars that do not…
Following the news that Mark Zuckerberg was hacked on Twitter and Pinterest, below the comments from two different sources. Neil Costigan, CEO of behavioural biometrics firm BehavioSec that discusses the issue around sharing the same passwords across different accounts and how often consumers don’t see security as a priority and instead convenience wins all. Richard Parris, CEO at Intercede highlights that security must be embedded into the very fabric of the technology ecosystem. Neil Costigan, CEO of behavioural biometrics firm at BehavioSec: “If the hackers are telling the truth and one of the biggest brains in tech has in fact fallen…
Following the news about theft of NFL former players’ medical records, security experts from VASCO and Balabit commented below. Michael Magrath, current Chairman, Director of Healthcare Business at VASCO Data Security: “This is a clear example that healthcare breaches are not isolated to healthcare organizations. They apply to employers, including the National Football League. Teams secure and protect their playbooks and need to apply that philosophy to securing their players’ medical information. “Laptop thefts are common place and one of the most common entries (310 incidents) on the HHS’ Office of Civil Rights portal listing Breaches Affecting 500 or More Individuals. Encryption is…